International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869 (O) 2454-4698 (P) Volume-7, Issue-7, July 2017
Advanced Multiple Watermarking Scheme for Copyright Protection and Image Authentication Kaniz Ayesha, Mr. Praveen Kumar Tripathi Abstract— The advancement in communication medium is producing large volume of digital information which needs to be protected. Watermarking is a technique that is used to hide secret information into original signal in a manner that improves overall quality of the original signal. In case of digital image watermarking, another area that is drawing attention is the multiple watermarking, where more than one watermark is embedded into single multimedia object. Multiple watermarks are normally proposed as a method to provide extra security to an image by embedding two or more secret messages into the cover image. In the present research work, the concept of multiple watermarking is used to hide both copyright and authentication information into a color image. For this purpose a wavelet transformation based on texture properties and secret sharing using visual cryptography is used. The various benchmarks and attacks are applied on the watermarked images to evaluate the performance of the proposed scheme. Experimental results indicate that the proposed watermarking scheme is highly robust and does not degrade the original signal. To minimize the difference between original and watermarked singular values, an optimized-quality formula is proposed. First, the peak signal-to-noise ratio (PSNR) is defined as a performance index in a matrix form. Then, an optimized-quality functional that relates the performance index to the quantization technique is obtained. Experimental results show that the watermarked image can keep a high PSNR and achieve less mean square error (MSE) even when the number of coefficients for embedding a watermark bit increases. Index Terms—Watermarking, PSNR, MSE, DWT.
I. INTRODUCTION With the rapid development of activity on the internet, much digital information is widely spread. Digital watermarking was developed to hide digital information and protect the copyright of multimedia signals, like audio, images, etc. Due to the fact that discrete-time wavelet transform (DWT) provides a useful platform, numerous DWT-based algorithms for digital watermarking have been proposed in recent years. Watermarking in the spatial domain [1–11] is usually more vulnerable than watermarking in the frequency domain [12–29] with the same embedding capacity due to the fact that spatial-domain methods are generally fragile to image-processing operations and other attacks [23–25]. The spatial-domain singular value decomposition (SVD) for image watermarking was first introduced by Liu et al. [8]. In this paper, the authors used a spread-spectrum technique to embed a watermark by modifying the singular values of the host image in the spatial domain. Some authors embedded Kaniz Ayesha, M.Tech Scholar, Department of Computer Science & Engineering, Kanpur Institute Technology Kanpur, India. Praveen Kumar Tripathi, Assistant Professor, Department of Computer Science & Engineering, Kanpur Institute Technology Kanpur India.
116
watermark to U and V components to increase embedding capacity [9, 10] while Ghazy et al. [11] presented a blockbyblock SVD-based image-watermarking scheme to increase embedding capacity. However, the robustness of SVD-based image watermarking in the spatial domain is low. In recent years, many image-watermarking techniques combine DWT and SVD to achieve better transparency and robustness [17, 18, 24, 25]. Bao et al. [17] proposed a novel, yet simple, image-adaptive watermarking scheme for image authentication by applying a simple quantization indexmodulation process on each single singular value of the blocks in the wavelet domain. Their watermarking scheme is blind and is robust against JPEG compression but extremely sensitive to malicious manipulation such as filtering and random noising. Ganic et al. [18] applied SVD to all details, approximating part of the DWT and watermark image to increase embedding capacity. Gaurav and Balasubramanian [24] embedded a watermark into the reference image by modifying the singular value of the reference image using the singular values of the watermark. The robustness is slightly enhanced. However, the computation is significantly increased. Lai and Tsai [25] reduced the computation in [24] by directly embedding the watermark into the singular values in the wavelet domain. In this work, we first divide the DWT middle frequency parts LH3 and HL3 into several square blocks to have high embedding capacity. Unlike the traditional spread-spectrum technique on single singular values [24, 25], we use multiple singular value quantizations to embed a watermark bit. It does not only keep a high embedding capacity but also achieves strong robustness against median filtering. On the other hand, an optimized quality formula is proposed by minimizing the difference between original and watermarked singular values. First, the peak signal-to-noise ratio (PSNR) is defined as a performance index in matrix form. Then, an optimized quality functional that relates the performance index to the quantization technique is obtained. Finally, the Lagrange Principle is utilized to obtain the optimized quality formula; then, the formula is applied to watermarking. Experimental results show that the watermarked image can keep a high PSNR and achieve a better bit error rate (BER) even when the number of coefficients for embedding a watermark bit increases. In particular, the robustness against median filtering is significantly improved. This paper is organized as follows. In Section II, we review some mathematical preliminaries. Section III introduces the proposed watermark embedding and extraction. In Section IV, we rewrite PSNR as a performance index. An optimized-quality equation that relates the performance index to the quantization constraint is proposed, and the Lagrange Principle is used to solve the optimized-quality problem. The solution is utilized to embed the watermark, and we discover a very good result; the watermark is extracted without the
www.erpublication.org
Advanced Multiple Watermarking Scheme for Copyright Protection and Image Authentication original image. In Section V, we present some experiments to test the performance of the proposed scheme and also appear some performance table. Finally, conclusions are drawn in Section VI. Assistant
Where, U and V are orthogonal matrices, and D = diag(λi) is a diagonal matrix of singular values λi, i = 1, 2, ⋯, which are arranged in decreasing order. The columns of U are the left singular vectors, and the columns of V are the right singular vectors of image A.
II. PRELIMINARIES In this section, some related steps for the proposed image watermarking scheme are reviewed. DISCRETE-TIME WAVELET TRANSFORM (DWT) The wavelet transform is obtained by a single prototype function which is regulated with a scaling parameter and shift parameter [28–31]. The discrete normalized scaling and wavelet basis function are defined as follows: (1)
(2) where j and τ are the dilation and translation parameters; from this, one can require that the sequence
Figure 1: 2D DWT III. OPTIMIZATION SOLVER
(3) Forms a mutiresolution analysis of L2(ℝ) and that the subspaces ⋅ ⋅⋅, W1, W0, W− 1, ⋅ ⋅ ⋅ are the orthogonal differences of the above sequence; that is, Wj is the orthogonal complement of Vj inside the subspace Vj − 1. Then, the orthogonality relations follow from the existence of sequences h = {hτ}τ ∈ ℤ and g = {gτ}τ ∈ ℤ that satisfy the following identities: (4)
To find the extreme of the matrix function, some optimization methods are summarized in [29–31]. The operations of the matrix function are first shown as follows: Theorem 1: If W is a k × k constant matrix, and X^ is a k × 1 column vector with k unknown variables, then
(7) Theorem 2: If X is a k × 1 constant vector and ^X is a k × 1 column vector with k unknown variables, then
(5) where h = {hτ}τ ∈ ℤ and g = {gτ}τ ∈ ℤ are, respectively, the sequence of low-pass and high-pass filters. In this paper, we use a Haar scaling function and wavelet to transform the host image into the orthogonal DWT domain by three-level decomposition. A method to implement DWT is a filter bank that provides perfect reconstruction. DWT has local analysis of frequency in the space and time domains, and it obtains image multi-scale details step by step. If the scale becomes smaller, every part gets more accurate and ultimately all image details can be focalized accurately. If DWT is applied to an image, it will produce high-frequency parts, middle-frequency parts, and a lowest-frequency part. Figure 1 shows the procedure of applying one-level DWT to an image. In order to guarantee both image quality and robustness, this study embeds the watermark into the middle frequency parts LH3 and HL3 in DWT level-three.
(8)
SINGULAR VALUE DECOMPOSITION (SVD) The singular value decomposition of a matrix A with size m × n is given by (6) Figure 2: Watermark Embedded Process
117
www.erpublication.org
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869 (O) 2454-4698 (P) Volume-7, Issue-7, July 2017 IV. PROPOSED WATERMARKING SCHEMES
Now we consider the problem of minimizing (or maximizing) the matrix function f (X^) subject to a constraint bX¼ 0. This problem can be described as follows:
The proposed watermarking scheme is introduced in this section. The watermark is extracted without the original image. A. Embedding Algorithm Input: Cover Image and Watermark Image Output: Watermarked Image
9(a) 9(b) Theorem 3: Suppose that g is a continuously differentiable function of on a subset of the domain of a function f. Then if minimizes (or maximizes) f ( ) subject to the Constraint ( ) ; ∇f ( ) and ; ∇g ( ) are parallel.
Step 1: Read cover image ‘P’ and watermark image ‘WI’ with NXN size.
That is, if b_X0_≠0, then there exists a scalar ξ such that
Step 2: The cover image and watermark image is converted into YCbCr colour space from RGB colour space and one of the channel is chosen for embedding.
(10)
Step 3: Perform 1-LWT on the Y channel of P and WI to split into four groups. Step 4: Perform 2-LWT on the HL band of P and WI to split into four groups. Step 5: Apply WHT on HL band of cover and watermark image. for x,m = 0,1,2,........,M-1, and y,n = 0,1,2,... ...... N-1.For MxM square images the above transform pair is reduced to
is the kth bit in the binary representation of z, is the HL band of cover and watermark image in rows and columns.For (m,n) = 0,1,2,. . . . . . .N-1, n = is order of sequence Step 6: Perform SVD on the WHT coefficient of the P and WI image. Figure 3: Watermark extraction process
(11) Then the original problem (9) becomes a function H ( ξ) which has no constraint. The necessary conditions for existence of the extreme of function H ( ξ) are:
Step 7: Modify the singular value of Si by embedding the singular value of watermark image such that
Where WI is modified matrix of and alpha denotes the scaling factor, is used to have power over the signal power of watermark. (12) Step 8: Embed singular matrices with orthogonal matrices for final watermark image as W with below formula: (13)
118
www.erpublication.org
Advanced Multiple Watermarking Scheme for Copyright Protection and Image Authentication Where x is cover image, x^ is watermarked image, N is the size of the cover image
Step 9: Apply 2D-IWHT to reconstruct the matrix.
Step 10: Perform the two level inverse LWT (ILWT) on the LWT transformed image, to obtain the watermarked image on four coefficients.
Where m is the maximum value of the cover image V. RESULTS Original image or input images have a RGB combination. Image processing begins with an image acquisition process. The two elements are required to acquire digital images.
B. Extraction Algorithm Input: Watermarked Image Output: Attacked Image
The following figure 4 has been taken to test the system.
Step 1: Apply Gaussian Attack and Crop Attack on watermarked image for security and robustness. Input: Watermarked Image Output: Extracted Watermark Image Figure 4 Experimental Dataset Now here, we have use Gaussian Attack and Crop Attack, while watermarking the images. we have taken cover image as body parts image and watermark image as Rose image with Gaussian attack using ref techniques shown in figure 5. Step 1: Apply two levels LWT transform to decompose the watermarked image W into four overlapping sub-bands. Step 2: Apply WHT to HL sub band using equation (4.1). Step 3: Apply SVD to sub band i.e. Step 4: Modify the singular value of Si by extracting the singular value of watermarked image such that Figure 5 Watermarking Procedure with Gaussian attack Step 5: Extract singular matrices with orthogonal matrices for final extracted watermark image and cover image as W with below formula:
We have taken cover image as Body parts image and watermark image as Rose image with Crop attack using ref techniques shown in figure 6.
Step 6: Apply 2D-IWHT to reconstruct the matrix in equation (4.5). Step 7: Perform the two level inverse LWT (ILWT) on the LWT transformed image, to obtain the extracted watermark and cover image on four coefficients. Step 8: Calculate PSNR and RMSE value of watermarked and cover image.
Figure 6 Watermarking Procedure with Crop attack We have taken cover image as Body parts image and watermark image as Rose image with Gaussian attack with proposed techniques shown in figure 7.
119
www.erpublication.org
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869 (O) 2454-4698 (P) Volume-7, Issue-7, July 2017 Table 3: PSNR comparison between ref and proposed when different channels are chosen to embed
Figure 7 Watermarking Procedure with Gaussian attack We have taken cover image as Body Parts image and watermark image as Rose image with average attack using proposed techniques shown in figure 8.
Tick Label
Ref PSNR (in dB)
Proposed PSNR
Y
Cb
Cr
Y
Cb
Cr
A
24.46
10.67
10.84
50.79
58.90
59.48
B
14.57
10.75
9.36
42.95
63.82
63.26
C
13.54
9.79
7.89
64.11
70.59
70.67
D
12.55
12.03
11.31
49.57
68.95
68.58
E
14.67
14.64
8.95
45.29
67.45
67.75
F
22.41
9.48
13.37
41.41
57.21
57.69
Table 4: RMSE after various attacks when Y-channel was used for watermarking Tick Label A
Cover Image Bodyparts
Watermark Image Rose
B
Baboon
Pepper
C
Sonogram
D
Lena
E
Head
F
Modi ji
Attacks Gaussian Crop 23.98 97.49 34.59
93.54
Ship
7.41
87.33
Pepper
12.84
89.64
Rose
10.49
89.95
Ship
4.10
87.75
Table 5: RMSE after various attacks when Cb-channel was used for watermarking
Figure 8 Watermarking Procedure with Crop attack
Tick Label A
Cover Image Bodyparts
Watermark Image Rose
Table 1: PSNR comparison between ref and proposed for watermarking
B
Baboon
Pepper
1.72
87.67
C
Sonogram
Ship
0.99
87.67
Tick Label
Cover Image
Watermark Image
Ref PSNR
Proposed PSNR
D
Lena
Pepper
1.43
87.65
E
Head
Rose
1.16
87.67
A
Bodyparts
Rose
53.2186
58.80
F
Modi ji
Ship
1.08
89.95
B
Baboon
Pepper
53.1970
53.91
C
Sonogram
Ship
53.1722
65.44
D
Lena
Pepper
53.1418
57.24
E
Head
Rose
53.1282
56.24
F
Modi ji
Ship
53.1080
52.56
Similarly, we can test with different images; the following table illustrates the performance.
Attacks Gaussian Crop 1.49 87.69
Table 6: RMSE after various attacks when Cr-channel was used for watermarking Cover Image Bodyparts
Watermark Image Rose
B
Baboon
Pepper
2.23
87.69
C
Sonogram
Ship
0.99
87.67
Table 2: Time comparison between ref and proposed for embedding
D
Lena
Pepper
1.46
87.63
E
Head
Rose
1.15
85.45
Tick Label
Watermarked Image
F
Modi ji
Ship
1.08
86.98
A B C D E F
Rose Pepper Ship Pepper Rose Ship
Ref Embedding Time 0.5413 0.5734 0.5298 0.5487 0.5206 0.5350
Tick Label A
Proposed Embedding Time 0.8413 0.7334 0.6598 0.5987 0.6806 0.6450
Table 2 shows the comparison between Ref and proposed scheme using Embedding Time. It describes the time of adding two images using proposed algorithm.
120
Attacks Gaussian Crop 1.79 87.74
Figure 9 PSNR comparisons between Ref and Proposed method
www.erpublication.org
Advanced Multiple Watermarking Scheme for Copyright Protection and Image Authentication
Figure 10 Time comparison between Ref and Proposed for embed The purpose of calculating the performance of the image and after that comparison between ref and proposed methods will show which method is better for image watermarking. Such method is mainly due to highly accurate detection with various attacks. The (Peak signal to noise ratio) PSNR, (Signal to noise ratio) SNR is high; (mean squared error) MSE is low. This proposed method is a fast method for image watermarking. VI. CONCLUSION This study improved the robustness of traditional SVD based Digital image watermarking by using optimization-based quantization on multiple singular values in the wavelet domain. Experimental results show that the watermarked image can keep a high PSNR and achieve a lower MSE even when the number of coefficients for embedding a watermark bit increases. In particular, the robustness against JPEG compression, Gaussian noise, and median filtering is significantly improved. The future work is the consideration of improving robustness against rotation. REFERENCES [1] F Hartung, M Kutter, Multimedia watermarking techniques. Proceedings of the IEEE, 1999, p. 87 [2] M Alghoniemy, AH Tewfik, Geometric distortion correction in image watermarking, in Proceedings SPIE Security and Watermarking of Multimedia Contents II 3971, 2000, pp. 82–89 [3] M Alghoniemy, AH Tewfik, Progressive quantized projection watermarking scheme, in Proceedings 7th ACM International Multimedia Conference, Orlando, FL, 1999, pp. 295–298 [4] B Chen, GW Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47, 1423–1443 (2001) [5] P Kumswat, K Attakitmongcol, A Striaew, A new approach for optimization in image watermarking using genetic algorithms. IEEE Trans. Signal Process. 53(12), 4707–4719 (2005) [6] MU Celik, G Sharma, AM Tekalp, E Saber, Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14(2), 253–266 (2005) [7] LC Lin, YB Lin, CM Wang, Hiding data in spatial domain images with distortion tolerance. Elsevier: Computer Standards and Interfaces 31, 458–464 (2009) [8] R Liu, T Tan, An SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions on Multimedia 4(1), 121–128 (2002) [9] C-C Chang, P Tsai, C-C Lin, SVD-based digital image watermarking scheme. Pattern Recogn. Lett. 26(10), 1577–1586 (2005) [10] KL Chung, WN Yang, YH Huang, ST Wu, YC Hsu, On SVD-based watermarking algorithm. Application. Math. Comput. 188, 54–57 (2007) [11] RA Ghazy, NA El-fishawy, MM Hadhoud, MI Dessouky, FEA El-Samie, An efficient block-by-block SVD-based image watermarking scheme, in 2007 Radio Science Conference, Cairo, 2007, pp. 1–9
121
[12] SF Lin, SC Shie, JY Guo, Improving the robustness of DCT-based image watermarking again JPEG compression. Elsevier: Computer Standards and Interfaces 32, 57–60 (2010) [13] CC Lin, PF Shiu, High capacity data hiding scheme for DCT-based images. J. Inform. Hiding. Multimedia. Signal. Process. 1(3), 220–240 (2010) [14] H Qaheri, A Mustafi, S Banerjee, Digital watermarking using ant colony optimization in fractional fourier domain. J. Inform. Hiding. Multimedia. Signal. Process. 1(3), 179–189 (2010) [15] CH Manuel, GU Francisco, NM Mariko, HM Pérez-Meana, Robust hybrid color image watermarking method based on DFT domain and 2D histogram modification. Springer: Signal Image and Video Processing 8(1), 49–63 (2014) [16] L Xiao, H Wu, Z Wei, Multiple digital watermarks embedding in wavelet domain with multiple-based number. J. Computer. Aided. Design. Computer. Graphics. 15(2), 200–204 (2003) [17] P Bao, X Ma, Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Transactions on Circuits and Systems for Video Technology 15(1), 96–102 (2005) [18] E Ganic, AM Eskicioglu, Robust embedding of visual watermarks using DWT-SVD. J. Electronic. Imaging. 14(4), 1–13 (2005) [19] M Sharkas, B Youssef, N Hamdy, An adaptive image-watermarking algorithm employing the DWT. the 23th National Radio Science Conference, 2006, pp. 14–16 [20] CT Li, Reversible watermarking scheme with image-independent embedding capacity. IEEE Proceedings on Vision, Image, and Signal Processing 152(6), 779–786 (2006) [21] CV Serdean, MK Ibrahim, A Moemeni, MM Al-Akaidi, Wavelet and multiwavelet watermarking. IET Image Process. 1(2), 223–230 (2007) [22] OZ Azza, M Achraf, B Ammar, Wavelet domain watermark embedding strategy using TTCQ quantization. J. Computer Sci. Network Security. 7(6), 165–170 (2007) [23] N Li, X Zheng, Y Zhao, H Wu, S Li, Robust algorithm of digital image watermarking based on discrete wavelet transform. International Symposium on Electronic Commerce and Security, 2008 [24] B Gaurav, R Balasubramanian, A new robust reference watermarking scheme based on DWT-SVD. Elsevier: Computer Standards and Interfaces, 2009, pp. 1–12 [25] CC Lai, CC Tsai, Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060–3063 (2010) [26] S-T Chen, H-N Huang, C-Y Hsu, Optimization-based image watermarking scheme in the wavelet-domain, in 2010 Fourth International Conference on Genetic Evolutionary Computing, ShenZhen, China, 2010, pp. 671–674 [27] K Loukhaoukha, JY Chouinard, MH Taieb, Optimal image watermarking algorithm based on LWT-SVD via multi-objective and colony optimization. J. Inform. Multimedia. Signal. Process. 2(4), 303–319 (2011) [28] A Mishra, C Agarwal, A Sharma, P Bedi, Optimized gray-scale image watermarking using DWT- SVD and firefly algorithm. Elsevier: Expert Systems with Applications 41, 7858–7867 (2014) [29] S-T Chen, H-N Huang, W-M Kung, C-Y Hsu, Optimization-based image watermarking with integrated quantization embedding in the wavelet domain. Springer: Multimedia Tools and Applications, 2015. doi:10.1007/s11042-015-2522-8 [30] S-T Chen, G-D Wu, H-N Huang, Wavelet-domain audio watermarking scheme using optimisation-based quantisation. IET Proceedings on Signal Processing 4(6), 720–727 (2010) [31] S-T Chen, H-N Huang, C-C Chen, K-K Tseng, S-Y Tu, Adaptive audio watermarking via the optimization point of view on wavelet-based entropy. Elsevier: Digital Signal Processing, 2013, pp. 971–980 Kaniz Ayesha, M.Tech Scholar, Department of Computer Science & Engineering, Kanpur Institute Technology Kanpur, India. Praveen Kumar Tripathi, Assistant Professor, Department of Computer Science & Engineering, Kanpur Institute Technology Kanpur India.
www.erpublication.org